DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks Sonia Jahid 1, Shirin Nilizadeh 2, Prateek Mittal 1, Nikita Borisov.

Slides:



Advertisements
Similar presentations
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Social Networking with Frientegrity Ariel J. Feldman Usenix Security.
Advertisements

Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
P3: Toward Privacy-Preserving Photo Sharing Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega Networked Systems Laboratory & Signal and Image Processing.
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
UnFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol.
Secure and Flexible Framework for Decentralized Social Network Services Luca Maria Aiello, Giancarlo Ruffo Università degli Studi di Torino Computer Science.
Privacy-preserving Services: Social Networks Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Privacy in Online Social Networks Sonia Jahid Department of Computer Science University of Illinois at Urbana-Champaign March 10,
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Metadata Issues in a Cryptographic File System David Bindel IRAM/ISTORE/OceanStore Retreat.
Center for Autonomic Computing Intel Portland, April 30, 2010 Autonomic Virtual Networks and Applications in Cloud and Collaborative Computing Environments.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Security and Privacy in Social Networks Raymond Heatherly Data Security.
Sonia Jahid, Prateek Mittal, Nikita Borisov University of Illinois at Urbana-Champaign Presented by Nikita Borisov ASIACCS 2011.
SPORC: Group Collaboration using Untrusted Cloud Resources OSDI 2010 Presented by Yu Chen.
ObliviStore High Performance Oblivious Cloud Storage Emil StefanovElaine Shi
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Secure Web Applications via Automatic Partitioning Stephen Chong, Jed Liu, Andrew C. Meyers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng. Cornell University.
1 Role-Based Cascaded Delegation: A Decentralized Delegation Model for Roles Roberto Tamassia Danfeng Yao William H. Winsborough Brown University Brown.
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Prateek Basavaraj April 9 th 2014.
SPrint: A Smart Printing Service for Siebel Center Imranul Hoque, Sonia Jahid, Ahsan Arefin {ihoque2, sjahid2, illinois.edu Department of Computer.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Containment and Integrity for Mobile Code End-to-end security, untrusted hosts Andrew Myers Fred Schneider Department of Computer Science Cornell University.
Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees Adam J. Lee, Kazuhiro Minami, and Marianne Winslett University.
Presented by: Sanketh Beerabbi University of Central Florida.
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh, 1 Sonia Jahid, 2 Prateek Mittal, 3 Nikita.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Enhancing Security and Privacy in Online Social Networks Sonia Jahid University of Illinois at Urbana-Champaign PhD Forum.
Tiered Incentives for Integrity Based Queuing Fariba Khan, Carl A. Gunter University of Illinois at Urbana-Champaign.
Trust calculus for PKI Roman Novotný, Milan Vereščák.
Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov and Kazuhiro Minami University of Illinois at Urbana-Champaign.
Erin Winter March 25 th, 2009 Mr. Tieri.  Talk to friends, family, co-workers etc.  Share pictures  Meet new people & Connect with old friends  Send.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh, 1 Sonia Jahid, 2 Prateek Mittal, 3 Nikita.
Community-enhanced De-anonymization of Online Social Networks Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn Indiana University Bloomington CCS 2014.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control Sonia Jahid 1, Carl A. Gunter 1, Imranul Hoque 1, and Hamed Okhravi 2 University.
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Multiparty Access Control for Online Social Networks : Model and Mechanisms.
Pythia: A Privacy Aware, Peer-to-Peer Network for Social Search Shirin Nilizadeh, Naveed Alam, Nathaniel Husted, Apu Kapadia School of Informatics and.
Middleware issues: From P2P systems to Ad Hoc Networks
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
A Policy Based Infrastructure for Social Data Access with Privacy Guarantees Tim Finin (UMBC) for: Palanivel Kodeswaran (UMBC) Evelyne Viegas (Microsoft.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Key management issues in PGP
Computer Communication & Networks
Signing transactions anonymously with Identity Mixer in Hyperledger
Efficient CRT-Based RSA Cryptosystems
Jalal Al-Muhtadi, Roy Campbell, Apu Kapadia, M
You Lu, Zhiyang Wang, Yu-Ting Yu, Mario Gerla
Certificates An increasingly popular form of authentication
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Scalable and Privacy-preserving Design of On/Off-chain Smart Contracts
Presentation transcript:

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks Sonia Jahid 1, Shirin Nilizadeh 2, Prateek Mittal 1, Nikita Borisov 1, Apu Kapadia 2 1 University of Illinois at Urbana-Champaign 2 Indiana University Bloomington Presented by: Sonia Jahid SESOC, 2012

Privacy Issues 2

Decentralization - Challenges Availability Access control by others Confidentiality/Integrity Malicious activities 3 Provider Trusted Party Myself Hybrid Untrusted Party Existing Research – Diaspora* [ ] – LotusNet [Aiello et al. ’12] – SafeBook [Cutillo et al. ’09 ] – PeerSoN [Buchegger et al. ’09] – Persona [Baden et al. ’09] DHT Cryptography

4 Wall Status Comment Video Link OSN Data is complicated

Our Contribution Address the challenges – Decentralization of the OSN architecture – Advanced cryptography – Other design philosophes 5

Design – Data Structure 6 ObjectDataPolicyReferenceList Status Message Friend or Family Alice|Friend & Family Object Like! Friend or Colleague|Bob|Friend CommentReference Alice’s Status Bob’s Comment Read Write/Delete Append ID, Read-Policy, Write-Policy

Design – Privacy Policy Restrictive Policy on comments 7 Status DECENT rocks!Friend and FamilyCommentReference Alice Comment Like! Colleague or Neighbor BobAlice StatusReference 1

Design - DHT Provides – Storage/Lookup Operation – Availability – Append Operation Verifies – Write policy – Append policy Can not – Relate data to its owner – Figure out data owner’s social graph 8

Design – Confidentiality and Integrity Attribute-based Encryption – User-defined attribute-based policy – Frequent revocation 9 Bob CarolDiana 1 AND Colleague Neighbor OR Friend friend, neighbor colleague friend, colleague Alice S.Jahid, P.Mittal, N.Borisov, EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

Data Design – Confidentiality and Integrity Integrity Write Policy – set to the owner – Request signed with Write-Secret-Key – Verified by readers Append Policy – attribute-based – Comment-reference signed with Append-Secret-Key – Verified by readers Confidentiality ABE 10 Write-Public-Key Append-Public-Key E Alice (Write-Secret-Key) Alice’s Object ABE(Append-Secret-Key) Sign ABE Sign(CommentRef 1 ) Sign (CommentRef 2 )

Implementation and Evaluation Prototype in Java Simulation - FreePastry Simulator Experiments on PlanetLab – Kademlia 11 Simulation (60 Statuses) Experiment on PlanetLab (12 Statuses) Cryptography Progressive Lookup

Conclusion Contribution – Design and prototype of a decentralized OSN – Preliminary performance results Ongoing Work – Optimizations in cryptography and DHT Lookup 12 Shirin Nilizadeh Prateek MittalApu Kapadia Nikita Borisov

13